• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2
  • 2
  • 1
  • Tagged with
  • 5
  • 5
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Implementación de un bono de productividad y la mejora en los indicadores de gestión financiera de una empresa minera / Implementation of a productivity bonus and improvement in the financial management indicators of a mining company

Bravo Recines, Gastón Guido, Díaz Nieto, César Augusto 30 May 2020 (has links)
El presente trabajo de investigación tiene como objetivo implementar un pago variable en la empresa minera con el fin de motivar y recompensar a los trabajadores de la empresa mediante el cumplimiento de objetivos de indicadores clave como son la producción, seguridad en el trabajo y el ausentismo del personal. Se realizó un análisis de la industria minera, en donde se establece la importancia de variables que permitan un incremento en la motivación de los trabajadores y a su vez una mejora en los ratios o indicadores de la empresa. La implementación del bono de productividad es parte de la estrategia de la empresa la cual se alinea a los objetivos de la compañía, así también se analizó la situación interna y externa de la empresa, con el fin de asegurar su aplicación y correspondencia con los trabajadores. Se realizó un análisis cuantitativo y cualitativo con expertos del sector, así también con los trabajadores que están dentro del alcance de esta implementación. Con el análisis económico, se estableció los costos de implementación del bono por cada indicador establecido y en base al peso y cumplimiento de cada uno. Finalmente, mediante el análisis financiero, se demuestra la viabilidad de la aplicación del bono de productividad como motivador de los trabajadores y la mejora de los indicadores de gestión empresarial, así como un mayor ingreso adicional. / The objective of this document of work is to implement a variable payment in the mining company to motivate and reward to the employees by meeting the objectives of key indicators such as production, safety and absenteeism. An analysis of the mining industry was carried out, establishing the importance of variables that allow an increase in the motivation of the employees as well as the improvement in the company's ratios or indicators. The implementation of the productivity bonus is part of the company strategy which is aligned with the objectives ​​of the company, and the internal and external situation of the company was also analysed, to ensure its application and correspondence with the employees. A quantitative and qualitative analysis was carried out with experts from the industry, as well as with employees who are within the scope of this implementation. With the economic analysis, the implementation costs of the bonus were established for each indicator based on the weight and the accomplish for each one. Finally, through financial analysis, the viability of applying the productivity bonus as a motivator for employees and the improvement of business management indicators, as well as an additional income, are demonstrated. / Trabajo de investigación
2

Practical Encryption Gateways to Integrate Legacy Industrial Machinery

Lackorzynski, Tim 12 August 2022 (has links)
Future industrial networks will consist of a mixture of old and new components, due to the very long life-cycles of industrial machines on the one hand and the need to change in the face of trends like Industry 4.0 or the industrial Internet of things on the other. These networks will be very heterogeneous and will serve legacy as well as new use cases in parallel. This will result in an increased demand for network security and precisely within this domain, this thesis tries to answer one specific question: how to make it possible for legacy industrial machines to run securely in those future heterogeneous industrial networks. The need for such a solution arises from the fact, that legacy machines are very outdated and hence vulnerable systems, when assessing them from an IT security standpoint. For various reasons, they cannot be easily replaced or upgraded and with the opening up of industrial networks to the Internet, they become prime attack targets. The only way to provide security for them, is by protecting their network traffic. The concept of encryption gateways forms the basis of our solution. These are special network devices, that are put between the legacy machine and the network. The gateways encrypt data traffic from the machine before it is put on the network and decrypt traffic coming from the network accordingly. This results in a separation of the machine from the network by virtue of only decrypting and passing through traffic from other authenticated gateways. In effect, they protect communication data in transit and shield the legacy machines from potential attackers within the rest of the network, while at the same time retaining their functionality. Additionally, through the specific placement of gateways inside the network, fine-grained security policies become possible. This approach can reduce the attack surface of the industrial network as a whole considerably. As a concept, this idea is straight forward and not new. Yet, the devil is in the details and no solution specifically tailored to the needs of the industrial environment and its legacy components existed prior to this work. Therefore, we present in this thesis concrete building blocks in the direction of a generally applicable encryption gateway solution that allows to securely integrate legacy industrial machinery and respects industrial requirements. This not only entails works in the direction of network security, but also includes works in the direction of guaranteeing the availability of the communication links that are protected by the gateways, works to simplify the usability of the gateways as well as the management of industrial data flows by the gateways.
3

The Use of Closed Circuit Television as an Implement of Industrial Security

Kirkpatrick, Edwin F. 12 1900 (has links)
The problem of this study was to determine to what extent industry was making use of closed circuit television as an implement of industrial security. The data for this study were provided by a group of thirty-two security chiefs of industry, and by another group of fifteen law enforcement officials in the Dallas and Fort Worth Metropolitan area. Of those industrial concerns making use of closed circuit television as an aid to security, a majority use the medium for surveillance of controlled access areas, with theft control and control of plant access following closely behind. For the most part, all surveyed thought that closed circuit television was very efficient.
4

Návrh řízení informační bezpečnosti v průmyslovém prostředí / Design of information security management in the industrial environment

Kadlec, Miroslav January 2018 (has links)
The diploma thesis deals with the design of information security management in the industrial environment. In the first part of thesis is mentioned the theoretical background from the area of information security. The analysis of the default status is followed, and the risk analysis is also performed. Further, the thesis deals with the design of the industrial network infrastructure and its management.
5

Návrh na zavedení průmyslového řešení ISMS ve výrobní společnosti / A Proposal for Industrial ISMS Implementation in Manufacturing Company

Kulhánek, Radek January 2016 (has links)
This diploma thesis deals with industrial ISMS implementation in manufacturing company. The theoretical part of thesis summarizes the theoretical knowledge in the field of information security and industrial security. In the following section company AB Komponenty s.r.o. is analysed. Then is performed analysis of risks based on selected assets and potential threats. Followed by design of the countermeasure to minimalize potential threats.

Page generated in 0.0749 seconds